During which step of the attack process does the threat actor gather information about the intended target?
Obfuscation
Reconnaissance
Weaponization
Command and control
An attacker currently creating customized malware for an attack. The malicious hacker plans to use the malware to access the company’s customer database to a remote location. Which phase of the attack lifecycle is this?
Action on Objective
Exploitation
Command and Control
None of the above
Next Concept